메뉴 건너뛰기




Volumn , Issue , 2007, Pages 312-320

On the power of Simple Branch Prediction Analysis

Author keywords

Branch prediction analysis; Modular exponentiation; RSA; Side channel analysis

Indexed keywords

BRANCH PREDICTION; COMPUTATION PROCESS; MODULAR EXPONENTIATION; PARTITIONING METHODS; RANDOMIZATION TECHNIQUES; RSA; SECURITY IMPLICATIONS; SIDE-CHANNEL ANALYSIS;

EID: 84876307879     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1229285.1266999     Document Type: Conference Paper
Times cited : (210)

References (41)
  • 2
    • 33744529805 scopus 로고    scopus 로고
    • Technical Report, 37 pages, April
    • D. J. Bernstein. Cache-timing attacks on AES. Technical Report, 37 pages, April 2005. Available at: http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
    • (2005) Cache-timing Attacks on AES
    • Bernstein, D.J.1
  • 4
    • 33745803485 scopus 로고    scopus 로고
    • High assurance computing on open hardware architectures
    • 17 pages, Microsoft Corporation, March
    • Y. Chen, P. England, M. Peinado, and B. Willman. High Assurance Computing on Open Hardware Architectures. Technical Report, MSR-TR-2003-20, 17 pages, Microsoft Corporation, March 2003. Available at: ftp://ftp.research.microsoft. com/pub/tr/tr-2003-20.ps
    • (2003) Technical Report, MSR-TR-2003-20
    • Chen, Y.1    England, P.2    Peinado, M.3    Willman, B.4
  • 5
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • June. [doi: 10.1109/TC.2004.13]
    • Benoît Chevallier-Mames, Mathieu Ciet, Marc Joye, Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity, IEEE Transactions on Computers, v.53 n.6, p.760-768, June 2004 [doi: 10.1109/TC.2004.13]
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevallier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 8
    • 0042349623 scopus 로고    scopus 로고
    • A trusted open platform
    • July. [doi: 10.1109/MC.2003.1212691]
    • Paul England, Butler Lampson, John Manferdelli, Marcus Peinado, Bryan Willman, A Trusted Open Platform, Computer, v.36 n.7, p.55-62, July 2003 [doi: 10.1109/MC.2003.1212691]
    • (2003) Computer , vol.36 , Issue.7 , pp. 55-62
    • England, P.1    Lampson, B.2    Manferdelli, J.3    Peinado, M.4    Willman, B.5
  • 11
    • 0035427012 scopus 로고    scopus 로고
    • Lattice attacks on digital signature schemes, designs
    • August. [doi: 10.1023/A:1011214926272]
    • N. A. Howgrave-Graham, N. P. Smart, Lattice Attacks on Digital Signature Schemes, Designs, Codes and Cryptography, v.23 n.3, p.283-290, August 2001 [doi: 10.1023/A:1011214926272]
    • (2001) Codes and Cryptography , vol.23 , Issue.3 , pp. 283-290
    • Howgrave-Graham, N.A.1    Smart, N.P.2
  • 17
    • 84876319896 scopus 로고    scopus 로고
    • SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
    • H. Kahl. SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation. Cryptology ePrint Archive, Report 2004/197, 2004, http://eprint.iacr.org/197.pdf.
    • (2004) Cryptology EPrint Archive, Report 2004/197
    • Kahl, H.1
  • 21
    • 1842765540 scopus 로고    scopus 로고
    • Microbenchmarks for determining branch predictor organization
    • April. [doi: 10.1002/spe.v34:5]
    • Milena Milenkovic, Aleksandar Milenkovic, Jeffrey Kulick, Microbenchmarks for determining branch predictor organization, Software-Practice & Experience, v.34 n.5, p.465-487, April 2004 [doi: 10.1002/spe.v34:5]
    • (2004) Software-Practice & Experience , vol.34 , Issue.5 , pp. 465-487
    • Milenkovic, M.1    Milenkovic, A.2    Kulick, J.3
  • 22
    • 74349098914 scopus 로고    scopus 로고
    • Advances on access-driven cache attacks on AES
    • Montreal, Canada, August, to appear at Springer LNCS
    • M. Neve and J.-P. Seifert. Advances on Access-driven Cache Attacks on AES. Proceedings of Selected Area of Cryptology (SAC 2006), Montreal, Canada, August 2006, to appear at Springer LNCS.
    • (2006) Proceedings of Selected Area of Cryptology (SAC 2006)
    • Neve, M.1    Seifert, J.-P.2
  • 23
    • 33746391879 scopus 로고    scopus 로고
    • The insecurity of the digital signature algorithm with partially known nonces
    • Springer
    • P. Q. Nguyen and I. E. Shparlinski. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Journal of Cryptology, vol. 15, no. 3, pp. 151176, Springer, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 151176
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 24
    • 0141889703 scopus 로고    scopus 로고
    • The insecurity of the elliptic curve digital signature algorithm with partially known nonces, designs
    • September. [doi: 10.1023/A:1025436905711]
    • Phong Q. Nguyen, Igor E. Shparlinski, The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces, Designs, Codes and Cryptography, v.30 n.2, p.201-217, September 2003 [doi: 10.1023/A: 1025436905711]
    • (2003) Codes and Cryptography , vol.30 , Issue.2 , pp. 201-217
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 39
    • 84876300422 scopus 로고    scopus 로고
    • Trusted Computing Group, http://www.trustedcomputinggroup.org.
  • 41
    • 0033204468 scopus 로고    scopus 로고
    • Montgomery exponentiation needs no final subtractions
    • October
    • C. D. Walter. Montgomery Exponentiation Needs No Final Subtractions. IEE Electronics Letters, volume 35, number 21, pages 1831-1832, October 1999.
    • (1999) IEE Electronics Letters , vol.35 , Issue.21 , pp. 1831-1832
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.